作者: Kevin D. Bowers , Nikolaos Triandopoulos , Todd A. Morneau , Salah Machani
DOI:
关键词: Encryption 、 Key distribution 、 Computer science 、 Verifiable secret sharing 、 Key (cryptography) 、 Secret sharing 、 Homomorphic secret sharing 、 Computer security 、 Shared secret 、 Secure multi-party computation
摘要: Encryption key(s) and/or other protected material are on devices. A secret splitting scheme is applied to a secret, S, that protects at least one data item obtain plurality of shares. At share encrypted provide using an encryption uses as the key. subset shares and share(s) required reconstruct S. One or more provided device, for example, based corresponding key-release policy, allow access item(s) secured by The comprises, key used protect content container vault storing items.